Hello Friends in this article i am gone to share Fortinet: NSE 2 Information Security Awareness | Security Information & Event Management Quiz Answers with you..
Course link: NSE 2 Information Security Awareness
Security Information & Event Management Quiz Answers
Question 1)
How did SIEM evolve?
- As a threat intelligence center only
- As an information platform only
- From an information platform to a threat intelligence center
- From an information platform to a fully integrated and automated center for security and network operations
Question 2)
Which three regulatory standards and acts must businesses, hospitals, and other organizations comply with? (Choose three.)
- SPML
- XSLT
- GDPR
- HIPAA
- PCI
Question 3)
Which three problems does SIEM solve? (Choose three.)
- The lack of security awareness by employees
- The long delay in discovering security breaches by security teams
- The complexity of technology and the difficulty with identifying attacks
- The lack of implementation of authentication methods
- More sophisticated and stealthy cyber attacks
Question 4)
Which two requirements led to the development of SIEM? (Choose two.)
- To simulate phishing attacks
- To perform vulnerability scanning
- To measure and prove compliance to various legislations
- To contend with the flood of alerts issued from IPSs and IDSs
Question 5)
What does the term SIEM stand for?
- Security Information and Event Manager
- Security Information and Email Management
- Security Information and Electronic Messaging
- Security Information and Emergency Management
Question 6)
Which three tasks must technology perform to satisfy network security compliance requirements? (Choose three.)
- Allow public access to aggregated logs
- Monitor, correlate, and notify events in real-time
- Aggregate logs from many network sources
- Prevent employees from accessing the internet
- Store log data for a length of time that satisfies auditing requirements
Question 7)
What does SIEM do primarily?
- Manage network events and alerts/
- Manage network information and alerts/
- Collect, normalize, and store log events and alerts
- Connect all security tools together into defined workflows
Question 8)
What was the impetus for more automation and machine learning in later SIEM devices?
- Demand to reduce MIS costs
- Requirement to manage Big Data
- Shortage of trained personnel
- Need to improve MIS efficiency
Question 9)
Which two requirements were the motivation for SIEM? (Choose two.)
- Exploiting Big Data
- Remaining competitive
- Complying to regulations
- Increasing number of alerts
Question 10)
Which feature is a characteristic of later SIEMs?
- Deciphering encrypted data flows
- Automatic backups and integrity checking
- Collect, normalize, and store log events and alerts
- User and entity behavior analytics (UEBA)
Question 11)
Which compliance, if ignored by businesses, hospitals, and other organizations, can result in punitive fines?
- Complying to regulations
- Complying to machine learning checks
- Complying to automatic backups and integrity checks
- Complying to User and entity behavior analytics (UEBA)
Question 12)
What was the primary driver for purchasing SIEM?
- Comply with regulations
- Improve MIS efficiency
- Collect information about customers
- Compensate for the skills-gap labor shortage
Question 13)
What is one method that SIEM uses to analyze data?
- Apply security controls
- Decipher encrypted data flows
- Decipher encrypted logs and alerts
- Watch for known indicators of compromise (IoC)
Question 14)
Which feature provides SIEM greater visibility into the entire network?
- Complying with regulations
- Analyzing logs and alerts from a single-pane-of-glass
- Sharing of logs by IoTs and BYODs
- Deciphering encrypted logs and alerts
Question 15)
Which problem was a barrier to the general acceptance of first-generation SIEM?
- Cost to purchase was prohibitive/
- The point solution approach to network security/
- Did not have the features needed by organizations
- High-level of skill was required
Question 16)
Which three compliance regulations are legislative and industry-sponsored? (Choose three.)
- Payment Industry Card (PIC) standard
- Payment Card Industry (PCI) standard
- General Data Protection Regulation (GDPR)
- Health Insurance Portability and Accountability Act (HIPAA)
- Health Portability Insurance and Accountability Act (HPIAA)
Question 17)
What is one method that SIEM uses to analyze data?
- Apply security controls
- Decipher encrypted data flows/
- Decipher encrypted logs and alerts
- Watch for known indicators of compromise (IoC)
Question 18)
What was the primary driver for purchasing SIEM?
- Comply with regulations
- Improve MIS efficiency
- Collect information about customers
- Compensate for the skills-gap labor shortage
Question 19)
What is one method that SIEM uses to analyze data?
- Apply security controls
- Decipher encrypted data flows
- Decipher encrypted logs and alerts
- Watch for known indicators of compromise (IoC)